Latest Articles

Categories: Vulnerabilities

[img_assist|nid=4181|title=|desc=|link=none|align=right|width=100|height=100]Joanna Rutkowska, a security researcher known for her work on virtualization security and low-level rootkits, has released a new open-source operating system meant to provide isolation of the OS’s components for better security.

Read more...

A rash of home foreclosures and abandoned dwellings had already taken its toll on the tax revenue for the Village of Summit, a town of 10,000 just outside Chicago. Then, in March, computer crooks broke into the town’s online bank account, making off with nearly $100,000. Read the full article. [KrebsonSecurity]

Read more...

[img_assist|nid=4171|title=|desc=|link=none|align=right|width=100|height=100]In a startling revelation, the open-source Mozilla project says that its flagship Firefox browser contains a root certificate authority that doesn’t seem to have a known owner.
It’s quite possible that this could be a legitimate root certificate that changed hands during a merger or some other transaction but the fact that Mozilla’s folks can’t seem to figure out the owner is disconcerting on many levels.

Read more...

[img_assist|nid=4168|title=|desc=|link=none|align=left|width=100|height=100]Espionage network GhostNet, first identified about a year ago, is much larger and more sophisticated than previously assumed according to a study entitled “Shadows in the Cloud”, by the Munk Centre for International Studies, the Information Warfare Monitor, the SecDev Group and the Shadowserver Foundation. Read the full article. [The H Security]

Read more...

[img_assist|nid=4164|title=|desc=|link=none|align=left|width=100|height=100]By David Emm (Securelist)Today’s threat landscape is very complex. Cybercriminals use a wide
range of threats to hijack people’s computers and to make money
illegally. These threats include Trojans of many different kinds,
worms, viruses and exploit code which is designed to enable malware to
make use of vulnerabilities in the operating system or applications.
Cybercriminals also employ a range of sophisticated techniques to hide
malware activity or to make it difficult for anti-virus researchers to
find, analyse and detect malicious code.

Read more...

[img_assist|nid=4153|title=|desc=|link=none|align=left|width=100|height=100]An internal review has found that the Justice Department has not done enough to fight identity theft, the fastest-growing crime in the country. Justice Department Inspector General Glenn Fine says in a report that the department is falling short in efforts to combat identity theft, and that the issue has faded as a priority over the past two years. Read the full article. [Forbes]

Read more...